Help Censored Users, Run a Tor Bridge

:slight_smile:

Hashed fingerprints:
0AD1B622E86698D8F1C978863CE25415281E5CB1
270CB7F19D71650F4CF3FD9AC15E624CE59BC237
985B91D23512F917A1F7062FFFF9C25978CC8533
9FD72C74853972A3EE057B5FAAAE4253A844123C
B464AB4E625CC2ADB1DCD495099CD0C39AD40269

1 Like

One more: Relay Search

1 Like

Hey,
Just installed my 1st bridge with docker.
Because of bug, the command from docs doesn’t working for me:

root@*:/home/tor# docker exec 2abf576a415f get-bridge-line
Could not create bridge line. Tor's log format may have changed. This is a bug.

I found an issue in project gitlab, so ok, lets do it manually.
I went into container:

docker exec -it 2abf576a415f bash
cd /var/lib/tor/pt_state
cat obfs4_bridgeline.txt

And got this line:
Bridge obfs4 <IP ADDRESS>:<PORT> <FINGERPRINT> cert=****** iat-mode=0
Next I checked out tor logs:

Tor 0.4.6.8 running on Linux with Libevent 2.1.12-stable, OpenSSL 1.1.1k, Zlib 1.2.11, Liblzma 5.2.5, Libzstd 1.4.8 and Glibc 2.31 as libc.
Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
Read configuration file "/etc/tor/torrc".
Based on detected system memory, MaxMemInQueues is set to 1480 MB. You can override this by setting MaxMemInQueues by hand.
Opening OR listener on 0.0.0.0:18799
Opened OR listener connection (ready) on 0.0.0.0:18799
Opening OR listener on [::]:18799
Opened OR listener connection (ready) on [::]:18799
Opening Extended OR listener on 127.0.0.1:0
Extended OR listener listening on port 40303.
Opened Extended OR listener connection (ready) on 127.0.0.1:40303
Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Configured to measure statistics. Look for the *-stats files that will first be written to the data directory in 24 hours from now.
You are running a new relay. Thanks for helping the Tor network! If you wish to know what will happen in the upcoming weeks regarding its usage, have a look at https://blog.torproject.org/blog/lifecycle-of-a-new-relay
It looks like I need to generate and sign a new medium-term signing key, because I don't have one. To do that, I need to load (or create) the permanent master identity key. If the master identity key was not moved or encrypted with a passphrase, this will be done automatically and no further action is required. Otherwise, provide the necessary data using 'tor --keygen' to do it manually.
Your Tor server's identity key  fingerprint is 'DockerObfs4Bridge ***'
Your Tor bridge's hashed identity key  fingerprint is 'DockerObfs4Bridge ***'
Your Tor server's identity key ed25519 fingerprint is 'DockerObfs4Bridge 38/***'
You can check the status of your bridge relay at https://bridges.torproject.org/status?id=***
Bootstrapped 0% (starting): Starting
Starting with guard context "default"
Registered server transport 'obfs4' at '[::]:18500'
Unable to find IPv4 address for ORPort 18799. You might want to specify IPv6Only to it or set an explicit address or set Address.

My questions are:
Which of these are my PORT and FINGERPRINT for bridgeline?
What is 40303 port? Is it static for all future bridges I’ll run? Should I allow this port in my firewall rules?

Are you running the latest docker image? This is an issue that we solved three weeks ago:

1 Like

Docker-compose file from guide is configured to use thetorproject/obfs4-bridge:latest so I think it’s the latest docker image.

All other servers deleted.

New ones (ipv4 and ipv6):
322D6F53F959B989CE0D10F733B0F9D0DA73D1DC
714BEA9C8EC36CAF4C94ADD6A3682B3A22B46018

1 Like

2 bridges so far, hashed fingerprints below:
A06B6A92E554AC4EE1F463C87ABEF6E84941CF1B
AC878EAD93980F84014DD958E0BCBF98245FDD5B

1 Like

2 posts were split to a new topic: What if an attacker is running a bridge

These are the hashes of the 10 tor bridges that i deployed recently:

5E312C3949D2D19E832AE187EF0526EC78768517
95017DB6E9E90FE4F0530E8B3554A7F7183204AD
C640ED39CABFE1236C13C3461FB8618942B0AB8D
46750CE1E60828CD745CFD8A78CF208E87180BE1
5B3074237A3A57C6CCDEE0ACF6A98A97CCF08BBC
4E220F45CD404C8A3082A36326A5ED19BB8D4404
ADBDE8C005B8AF3E4F87FE2159D7E26D99E8DE08
513F0BBFBAC15EB877684640209DE380B97EF628
E1E4CA68091E05CDB518DEB27B52A4ADA3233092
CA2645DCC5309CBC70C0118AB0A51FAEDA1C05BA

2 Likes

Hello, I tested your bridges with bridgestrap, and some of them don’t look functional. Could you fix it?

Bridge 5E312C3949D2D19E832AE187EF0526EC78768517 advertises:

* obfs4: dysfunctional
  Last tested: 2021-12-16 03:11:48.381690795 +0000 UTC (12h13m15.346790642s ago)

Bridge 95017DB6E9E90FE4F0530E8B3554A7F7183204AD advertises:

* obfs4: functional
  Last tested: 2021-12-16 03:12:48.948580163 +0000 UTC (12h12m16.274590554s ago)

Bridge C640ED39CABFE1236C13C3461FB8618942B0AB8D advertises:

* obfs4: dysfunctional
  Last tested: 2021-12-16 03:11:48.395600446 +0000 UTC (12h13m18.430583705s ago)

Bridge 46750CE1E60828CD745CFD8A78CF208E87180BE1 advertises:

* obfs4: dysfunctional
  Error: We got an ECONNRESET or similar IO error from the connection with the OR.
  Last tested: 2021-12-16 03:11:48.393001293 +0000 UTC (12h13m20.196859661s ago)

Bridge 5B3074237A3A57C6CCDEE0ACF6A98A97CCF08BBC advertises:

* obfs4: dysfunctional
  Last tested: 2021-12-16 03:12:48.544901239 +0000 UTC (12h12m21.346146308s ago)

Bridge 4E220F45CD404C8A3082A36326A5ED19BB8D4404 advertises:

* obfs4: dysfunctional
  Last tested: 2021-12-16 03:12:48.543181893 +0000 UTC (12h12m22.480240864s ago)

Bridge ADBDE8C005B8AF3E4F87FE2159D7E26D99E8DE08 advertises:

* obfs4: dysfunctional
  Last tested: 2021-12-16 03:12:48.531806468 +0000 UTC (12h12m23.461525611s ago)

Bridge 513F0BBFBAC15EB877684640209DE380B97EF628 advertises:

* obfs4: dysfunctional
  Error: We got an ECONNRESET or similar IO error from the connection with the OR.
  Last tested: 2021-12-16 03:11:48.39206874 +0000 UTC (12h13m24.833217609s ago)

Bridge E1E4CA68091E05CDB518DEB27B52A4ADA3233092 advertises:

* obfs4: dysfunctional
  Last tested: 2021-12-16 03:12:48.531628011 +0000 UTC (12h12m25.807412496s ago)

Bridge CA2645DCC5309CBC70C0118AB0A51FAEDA1C05BA advertises:

* obfs4: dysfunctional
  Error: timed out waiting for bridge descriptor
  Last tested: 2021-12-16 03:13:47.35780873 +0000 UTC (12h11m28.17949334s ago)

Hello :slight_smile: - I would like to participate to the campaign. Here is the hashed fingerprints of my bridges (10):

  • 43D4837CDFD7F7AA3C7BE87F82094041618A8C21
  • 3C06E9D9F05D4034B75D00405E64E9662120AADB
  • 9A2906CA09F4321055434870ACBBB847182C5D57
  • 8A0492C288A298DD83C455032D1EFC2A4C749030
  • 7A9A9CFA8295FF4C00FDC40BC919F25F67BB2BE5
  • 4D4F73DFE2EC9D515EB61C1AF28A329B7872C0CA
  • 6BB2F8C5BC0B0DD6ED49EACF14C3355BC0F81EB6
  • B574A040844715BE75A18DE2DEC091CD9E30D093
  • 778A326FABE6CB847B9D7257B73DF500AD0741FC
  • C32DA542CC96B8398FD5EF185EAE190E772F873E
2 Likes

Hello everyone!
Campaign update: the Golden Gate Kit is totally gone now!
If you’ve deployed 10 bridges till today (December 16 2021, 1900 UTC) you’re classified to get a Golden Gate Kit, which means if your bridges is running and online, you will get your kit as described on the blog post.

I’m testing all your bridges and checking its availability. It’s important to keep your bridges online and running. The other kits are still available. Thanks everyone!

5 Likes

Here are hashed fingerprints for twelve bridges, including four at a university.

22348F88367102D50D19D3A6B2BFCABFCE9C1171
43291DC823AD22A6B849AF91AD5F732151D48ACB
AFB5ADAACF25A92A40F1996EA052101D26ACC6D2
D1E4DF3DF4370616A32F06F882606D2265C2B326
1B9D5C42C06B125AF2C0447F76E9CFCFDE1B7C19
FDBA50DC23B7747340F0C23B8FB23716269BFB1A
9857AADE01B6D849F6061594D5A96940CEBCAC99
CCC54E64309D7165DC5D1090CCAF5A9B69FCBEED
97D1B89CE4CC1CCF4EBD4F138E9EEE538773F088
D6DF4589382A12BA3060676FF67924E350C3C114
322789ADAF3B4E0FE789992FF31A2095BBBB9FB4
563909738F44F4AD75C225A552D90B90AD5C6216

5 Likes

I’m happy to help Tor. So far, I have created 2 bridges that run 24/7. I care about anonymity and private users. I hope to get these things over time.

2 Likes

Hi

Just the one bridge so far:

2846E641CBC614AB2E24A437D9534689238FC824

Cheers
Paul

1 Like

A post was split to a new topic: Snowflake in Orbot

Hi, setup two bridges so far and also running a middle relay. Feels good to play my small role in this fight which I am sure i don’t get the full scale of.

3 Likes

Hi! I just joined the tor project and started my first bridge about a week ago:
10140C4EA056A81FC4CA3CEA941361F1FC5FD7BF

In the past, I’ve often thought about running a relay to support privacy via the tor network but never got around to it. For me, finding the docker container for an obfs4 bridge made setup and especially maintenance a lot easier, thanks for this. I’m happy to contribute some bandwidth, even if only in a small way. Happy holidays and all the best for 2020!

4 Likes

Hashed fingerprints for my 5 bridges

57F2FB750CFE5AC396EFCB50D223AC124D953ACC
458878D5376580CA92FFD6535C2598491A0CD1EA
DD9B8284A5754E4D0450317DA08F8F93606A742C
8AA06A351F52274AE7954EBF499EA97AD688C660
C8805D0A5EBFDC4679F4F8A5058DAE9502EE6DA6

5 Likes

Here are my bridges:

0611C65066C3A3E0D39A7934210A0D0B95E7B5D4
72E12B89136B45BBC81D1EF0AC7DDDBB91B148DB
EF17A6C48FC15C5D05BC63A50C7A1542794C44C4
1F1ED04824187BC0A2782DC7CBF7FEC7236EE8B8
BD05679A270633AEAF25D96AE29FA7D7C572D037
12645427453D541FD8F8F6802EA09532E0D62CDA
D270A8518898F30EC4CEB65E3AF56D27A418F722
5A873B777FA3C7709379140B5AED3495ABFDD81E
EF2EE8F601602A5D56D86AE33C80A509D2426299
11823662A38F238E82DCEB9564ADDCD6972B56AD

4 Likes